Friday, 28 August 2020

 10 Reasons Why PCs Crash You Must Know

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it from happening?

1. Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight the Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.


Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).


When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.


To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially, there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.


2. Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at a slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non-parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programs.

3 .BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.


Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).


4.Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimization. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.


Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise, assign the Task Scheduler to perform this operation at night when the computer is not in use.


5. Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have a video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.


6. Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus program is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).


7. Printers


The action of sending a document to print creates a bigger file, often called a postscript file.


Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.


If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.


8. Software


A common cause of computer crashes is faulty or badly installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the program in the System Registry and leaves the way clear for a completely fresh copy.


The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.


Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org


Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.


Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.


Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.


Remember to restore all the BIOS settings back to their former settings following installation.


9. Overheating


Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.


One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com


CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.


10. Power supply problems


With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.


If this has become a nuisance for you then consider buying an uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.


It is a good investment if your data is crutial because a power cut will cause any unsaved data to be lost.


10 Reasons Why PCs Crash You Must Know

Sunday, 16 August 2020

 What is spoofing and how to avoid it

Spoofing is a way of calling or sending a text message with someone else's phone number or sender ID.

Types Of Spoofing

  1. Email Spoofing
  2. Website or URL Spoofing
  3. Caller ID Spoofing
  4. Text Message Spoofing
  5. IP Spoofing
  6. Facial Spoofing
  7. GPS Spoofing
  8. Man-In-The-Middle Spoofing
1.Email Spoofing

It is the creation of email messages with a forged sender address. The core email protocols do not have any mechanism for authentication, making it common for spam and phishing emails to use such spoofing to mislead or even prank the recipient about the origin of the message. Don't believe every email you receive especially those claiming that you have won something and you need to send money for shipping or flight for your winnings to be sent to you cause you will be just sending money straight to scammers.

2.Website Spoofing

It is all about making a malicious website look like a legitimate one. The spoofed site will look like the login page for a website you frequent—down to the branding, user interface, and even a spoofed domain name that looks the same at first glance. Cybercriminals use spoofed websites to capture your username and password. Don't use links you receive to login to your accounts e.g PayPal, skrill, NetFlix and many other common and mostly used websites with login options.

3.Caller ID Spoofing

This happens when scammers fool your caller ID by making the call appear to be coming from somewhere it isn't. Scammers have learned that you're more likely to answer the phone if the caller ID shows an area code the same or near your own. In some cases, scammers will even spoof the first few digits of your phone number in addition to the area code to create the impression that the call is originating from your neighbourhood

4.Text Message Spoofing

Text message spoofing or SMS spoofing is sending a text message with someone else's phone number or sender ID. If you've ever sent a text message from your laptop, you've spoofed your own phone number in order to send the text, because the text did not actually originate from your phone. 

5.GPS Spoofing

GPS spoofing is an attack in which a radio transmitter located near the target is used to interfere with legitimate GPS signals. The attacker can transmit no data at all or could transmit inaccurate coordinates. This result in you tracing the fake location mostly of the scammer or believing that the one calling or texting you is a real agent of the company calling you just by seeing the fake location they want you to see.

6.Man-In-The-Middle-Attack

You have that habit of connecting to the free Wi-Fi at your local coffee shop and do business as usual on it just to save your own data? Have you considered what would happen if a cybercriminal hacked the Wi-Fi or created another fraudulent Wi-Fi network in the same location? In either case, you have a perfect setup for a man-in-the-middle attack, so named because cybercriminals are able to intercept web traffic between two parties. The spoof comes into play when the criminals alter the communication between the parties to reroute funds or solicit sensitive personal information like credit card numbers or logins. The solution to this is to avoid using free Wi-Fi offered at different places cause one day you might be the victim of this MITM Attack.

7.IP Spoofing

IP spoofing is used when someone wants to hide or disguise the location from which they're sending or requesting data online. As it applies to cyber threats, IP address spoofing is used in distributed denial of service attacks (DDoS) to prevent malicious traffic from being filtered out and to hide the attacker's location.

8.Face Spoof Attack

A face spoof attack is an attempt to deceive a face-recognition system using a substitute for another's person's face – usually their photo, video recording or a 3D mask. If the spoofing attack succeeds, the fraudster acquires privileges or access rights of another person. You may call it identity theft.

It is wise to stay protected online and to get as much knowledge as you need to help you secure yourself in this online world. To stay on the safe side in this online evolving world, feel free to follow us as our main motive is to make technology safe and simple to understand for everyone.

What is Spoofing and How to Avoid it

Friday, 24 July 2020

How to optimize hard disk in Windows 10

1. First, click to select settings.

2. Search for the control panel in the setting interface and open the control panel.

3. In the control panel, select the large icon or small icon as the viewing method, and then select the management tool.

4. Select defragment and optimize drive in the management tool.

5. Then select the disk that needs to be organized and optimized and select optimization.



                                                         
6. Of course, you can also enable the following optimization plan here, just click to enable it.

7. Then select the optimized frequency and the driver that needs to be optimized.

8. Then select Run as planned, and finally set up automatic optimization.

How to optimize hard disk in Windows 10

Tuesday, 14 July 2020

FIX  LAGGING, DRAGGING AND DELAYS ON ANDROID

Are you tired of using that android phone which always lags behind, worry no more because you have come to the right place to fix the problem once and for all. If you have a significantly old and low-end device, then this post is for you. Say bye to lagging and freezing problems which kill the performance of your phone while calling, using WhatsApp and many other apps.

Technically,  When the device runs out of this entropy pool, it has to rebuild itself causing delays in opening apps. This issue can be solved by using the Seeder app which takes the process that generates data and performs it every sec. Then it feeds that info to a new random data pool and keeps refreshing it regularly and further uses that data to keep the system pool juiced up so that it never runs out. This results in faster app launches, lag-free animations, and reduced navigation lag. A problem with this app is that it requires root privileges and is not compatible with newer versions of android. In such a case, you can also try the L Speed app for speeding up your Android phone.

If that fails you need to use the developer option in the android settings. To enable developer options go to settings, scroll down to About phone or tablet and select it. You will see where it is written build version and do multiple taps on it until a  message pops up and say you are now a developer. Go back to settings and then choose the developer options, after which you can reduce the animations speed by 0.5X or even disable them completely.

FIX LAGGING, DRAGGING AND DELAYS ON ANDROID

Saturday, 11 July 2020

What Is A Keylogger And How Does It Work?

A keylogger is a type of spyware that can be used to track and log the keys you strike on your keyboard, capturing any information typed. Keyloggers are insidious because you don’t know they’re there, watching and recording everything you type.

Who uses keyloggers?

Keyloggers are mostly used by internet service providers and hackers (cybercriminals). When it comes to ISPs don't worry for they collect the data to protect you (for security reasons). The data captured can include your personal and financial information, PIN codes, passwords, account numbers, CC numbers, and their CVV, the username (Facebook, Instagram, Netflix, Tiktok). Cybercriminals can then use this data to do fraud or identity theft.

Keyloggers can be software or hardware. Software is more common. The majority of keyloggers are used to capture payment card data you might enter online with a device. Once captured, your data can be retrieved by the person on the other end of the keylogger program.
Many keyloggers have root-kit functionality. That means they’re hiding in your system. These so-called Trojan-spy programs can track user activity — including keystrokes and screenshots —save the data to your hard disk, and forward the information to cybercriminals. 

Example

An example of a hardware-based keylogger is the keyboard overlay on an ATM. Every time a bank customer presses the buttons on the criminal’s fake keypad — thinking it’s the legitimate ATM keypad — the keylogger records the keystrokes and forwards the information to the cybercriminal.

How to Protect Yourself from Keylogger Attacks

And that's how easy it is for hackers to see and record every keystroke you press on your computer. When a hacker has an unnoticed backdoor on your computer, anything is possible, but there are a few things you can do to minimize the risk of having your keys captured

1)Using Antivirus Softwares
While there's not a catch-all solution, and antivirus software won't protect against sophisticated and cutting-edge keyloggers, there's still no excuse for not using antivirus software that protects against most known keylogger software.

2)Use on-screen keyboards when entering passwords
Yep, you read right, though it's laborious it is one of the best ways to kick keyloggers out. Not that exactly but leaving them with nothing send back to their servers. One of the limitations of most keyloggers is that they only capture actual keystrokes being pressed on the keyboard. The Windows on-screen keyboard will provide a virtual keyboard that may help circumvent keyloggers.

3)Use Firewalls
It's possible lazy attackers won't go through the effort of disguising their payloads to appear as being normal DNS (port 53) or HTTP (port 80) transmissions. A firewall might catch suspicious packets leaving your computer on port 35357.

Hope this information was helpful to you guys don't forget to comment down below and follow us for more ways to improve your Cyber Security.

What Is A Keylogger And How Does It Work?

Friday, 3 July 2020

 FIXXING 'UNFORTUNATELY APP HAS STOPPED' ERROR


There is one problem that plagues beginner and advanced Android owners alike  the cursed Unfortunately, (fill in app name here) has stopped error message blah blah blah blah.............
It appears when you're in the middle of using an app, and then forces that app to close.

Annoying, right? Fortunately, there is a way to stop it.Here's how to fix Unfortunately, app has stopped errors.

Clear out the app's storage

This problem often arises with the contacts, gallery and launcher apps.
The procedure to fix this is generally always the same.
First, navigate to Settings on your device.
Go to Applications Application manager Swipe left until you find the All tab.
Scroll down to the app that's causing problems and tap on it. Here you will find the Clear data and Clear cache options.
Clear cache is the option you should start with.
It will get rid of saved data that allows apps to load a little quicker when you launch them.
Clearing it means the app will open a little slower, but your main problem might well be solved.Clearing an app's cache can often solve the 'app has stopped' problem.

Well don't worry if that doesn't work on your phone you can go for option 2 (you read right, there is an option 2 waiting for you just scroll down)

Clear App Data

Clear data will erase all the app's data, including files, settings and accounts, so don't use this unless you have to.This will totally work that I guarantee.To clear app data just repeat same procedures of option 1 but this time choose clear data instead of cache.

If this doesn't work too, well, worry not cause I got you covered with option 3

Uninstall and reinstall the app from Google Play Store

Uninstall and reinstall the app If the app isn't built-in, you can also try uninstalling it and then reinstalling it from the Google Play Store.Simply open the Play Store app, open the menu bar on the left hand side and tap on My apps.Find the app and hit Uninstall, which takes a few seconds. Afterwards, you can install it again.

I'm sure by now your problem must been solved. If not, well, there is only one possible solution left which will be option 4 but I don't usually recommend this. To go for this option make sure you have tried all 3 above options.

Do a factory reset ( http://raboninco.com/1ES7E )

When doing a factory reset, ensure that you have backed up all of your data beforehand.To do this download BackUp apk. You can use this link http://raboninco.com/1ERcG to download App and Data Backup apk. This will backup all your apps and contacts to your sdcard so make sure you got plenty of space in your sdcard.Why backup data.This is because factory reset will wipe your device and set it back to factory defaults, taking everything, including any bugs (those causing your device to malfunction), with it. You can restore your apps and data afterwards easily, as long as you've made a backup. If you got problems on resetting your phone to factory default check my other posts on doing a safe factory reset.

This is Dark Zegg from Ndabs-tEch Industries.Thank you for reading this and I hope your problem has been fix.Bye

HOW TO FIX 'UNFORTUNATELY APP HAS STOPPED' ERROR